Support
  • About us
  • News & events
  • Case Studies
  • Contact us
  • Work with us
LogoLogo Light
  • Unity System
    • PPC (Power Plant Controller)
    • SCADA / Monitoring
    • CMS (Central Monitoring)
  • solar
  • wind
  • storage
  • microgrid
  • telecoms
  • Unity System
    • PPC (Power Plant Controller)
    • SCADA / Monitoring
    • CMS (Central Monitoring)
  • solar
  • wind
  • storage
  • microgrid
  • telecoms

Blog

  • You are here:
  • Home
  • Cybersecurity Management: A Survival Guide
Blog Image
News

Cybersecurity Management: A Survival Guide

  • On May 14, 2021

Industrial Control System (ICS) is a general term that encompasses several types of control systems, including Supervisory Control and Data Acquisition (SCADA) systems, Distributed Control Systems (DCS), and other control system configurations such as skid-mounted Programmable Logic Controllers (PLC) often found in the industrial sectors and critical infrastructures. ICS are typically used in industries such as electrical, water and wastewater, oil and natural gas, chemical, transportation, pharmaceutical, pulp and paper, food and beverage, and discrete manufacturing (e.g., automotive, aerospace, and durable goods.) These control systems are essential to the operation of the Critical Infrastructures that are often highly interconnected and mutually dependent systems.

The most critical and sensitive data of Critical Infrastructures is hosted in their Industrial control system (ICS). Degradation, interruption or impairment of their ICS has serious consequences on safety, loss of sensitive data, loss of reputation or loss of service making Cybersecurity Management one of the most important concerns. 

Cybersecurity Management is an important governance and administration procedure aiming at the protection of an organization from internal and external risks that would negatively affect the achievement of its operational objectives.  Specifically, in order to enhance the security controls, monitor their effective implementation and find ways for continuous improvement, the following steps are mandatory:

  • Step 1 – Assign Cybersecurity Roles & Responsibilities: appropriate roles should be defined and responsibilities should be assigned to authorized employees in order to continuously monitor the implemented cybersecurity controls ensuring continuous compliance with your Industry Cybersecurity requirements
  • Step 2 – ICS Architecture Review: evaluate your software, technologies, and network topology against industry best practices (i.e. NIST, SANS, ENISA) and regulatory requirements (such as NERC CIP, NIS, etc). 
  • Step 3 – System Security Plan: Identify the criticality of the provided services; identify the consequences in case of loss of security (confidentiality, integrity, availability) of System components; identify and evaluate the potential risks that would cause significant negative consequences to the proper operation of organization business activities; and propose targeted security countermeasures.
  • Step 4 – Risk Assessment: Identify and evaluate potential threats and vulnerabilities for each ICS asset. A series of proposed countermeasures (based on ISO 27001 and NIST) should be specified to reduce the level of risk per ICS asset
  • Step 5 – Design Cybersecurity Policies and Procedures: Design and implement the appropriate countermeasures by taking into account the results of the previous phases (i.e. ICS Architecture Review, System Security Plan and Risk Assessment). More specifically, the appropriate Security Policies should be specified, in order to ensure that the ICS Infrastructure complies with the industry specific cybersecurity requirements.
  • Step 6 – Conduct Security Assessments: Evaluate the maturity of the security levels of the critical components of your ICS infrastructure. Identify your technical vulnerabilities and define the appropriate solutions in order to effectively mitigate them on time. Conduct at least once a year penetration tests, source code audits and vulnerability assessments for all critical ICS components.
  • Step 7 – Compliance Audit: Identify the existing technical and procedural security controls as well as any grey areas that the Industry Specific Cybersecurity requirements are not properly addressed. Conduct audits in order to ensure compliance with your specific industry requirements (i.e. ISO 27001 Assessment, NERC CIP compliance audit, NIS compliance audit, NCSC guidelines for CNI, AICPA Trust Service Criteria compliance-SOC 2 Report, GDPR Assessment, etc.)
  • Step 8 – Training & Awareness Program: The success and effectiveness of Cybersecurity depends directly on the human factor — the personnel who apply and implement the organizational and technical security controls. Hence the Company should ensure that all personnel involved with the ICS are competent in performing the required tasks on the basis of education, training, skills and experience by implementing appropriate training and awareness programs.
  • Step 9 – Adopt a Detection & Response System: Implement a centralized logging and monitoring system in order to collect and analyze structured and unstructured security related data and telemetry from all systems, networks, and applications, generating valuable intelligence for new, emerging and advanced security threats in order to identify, analyze, predict, and prevent cyber-security threats in real time.

                                                                                                                       

Subscribe to our updated list to get more in-depth information on this topic

Subscribe

If you have any questions or you want Inaccess to implement these steps in your organization :

contact us now

Follow us on Social

 

TAGS: cyber security Data_acquisition Managment ransomware renewable energy safety SCADA Security solar

Previous Post

SolarPlaza Webinar: Bluefield-Inaccess

Next Post

Profit From Dynamic Containment in the UK
0 comments on Cybersecurity Management: A Survival Guide
Categories
  • Activity
  • Events
    • 2018
    • 2019
    • 2020
    • 2021
  • Learning
  • News
Scroll

inaccess

Contact us
Terms of use
Cookies Policy

Latest Posts
  • 75 MW / 300 MWh Energy Storage System Energization in California
  • The BESS Ecosystem
  • Solar Market Parity Spain 2021 Conference
  • The Solar Future Greece 2021 Conference
Contact us
Work with us Subscribe to our newsletter
Copyright © 2021 Inaccess. All Rights Reserved.

SOLUTIONS FOR PORTFOLIO OWNERS

View everything for all sites in one screen

Solid strategic choice for Large scale Portfolio Consolidations, with an intelligible platform from a single point of control .Range of 200-500 MW each, across several hundred sites and for an approx. total of 2GW.

Talk with our experts
  • Alert and False flags
  • Portfolio Management
  • Historical Data
  • Ticketing
  • Contract and Compliance Management
  • Work Order Management
  • Reporting
  • Energy Invoicing
  • Financial Management
  • Performance Monitoring and Integrations

SOLUTIONS FOR O&Ms

Accurate control at all levels with proactive management

Custom-built model for engineering, procurement, and construction. We help you by providing end-to-end services from designing the system, procuring the components and installing our solutions in projects

Talk with our experts
  • Identify underperformance
  • Ticketing
  • Portfolio consolidations
  • Real time data
  • Maintain functionality of your asset
  • Historical data
  • User friendly environment
  • Prioritize critical issues
  • System alerts accuracy
  • Custom graphing & schematics

SOLUTIONS FOR EPC's

End-to-end ー the maximum value in implementation

Custom-built model for engineering, procurement, and construction. We help you by providing end-to-end solar services from designing the system, procuring the components and installing our solutions in projects

Talk with our experts
  • Security
  • Commissioning & Installation
  • Accurate performance testing
  • On-site support
  • Project & Technical management
  • Coordinate all aspects on time

SOLUTIONS FOR DEVELOPERS

Capturing the maximum value in priority with clear guidelines

Custom-built model for developers that set up structure with clear objectives for product and business development teams. Go from conception to operation smoothly.

Talk with our experts
  • Extensive teams of experts
  • Security
  • Services response on time
  • Meet with roadmap
  • Trusted partnerships
  • Coordinate all aspects

SOLUTIONS FOR INVESTORS

Control your investment through high level management

Embrace the idea to get directions in innovation for your investment choices

Talk with our experts
  • Financial performance data
  • Access from a single point
  • Portfolio approach
  • Seamless summary views
  • Maximize profitability
  • Direction of innovation
  • Deployment
  • Technology risk
  • Performance Monitoring and Integrations
Newsletter subscription
Portfolio

Request a Demo